* Refactor testing, add defmt, add async gpio test * Add test to ensure the some edge case pins can be used in async mode * Add test for pin0 * clippy * update test to use constants extracted from esp-idf's soc module * address review comments * simplify test to just initialize one pin as async * changelog
101 lines
2.4 KiB
Rust
101 lines
2.4 KiB
Rust
//! AES Test
|
|
|
|
#![no_std]
|
|
#![no_main]
|
|
|
|
use defmt_rtt as _;
|
|
use esp_backtrace as _;
|
|
use esp_hal::{
|
|
aes::{Aes, Mode},
|
|
peripherals::Peripherals,
|
|
};
|
|
|
|
struct Context<'a> {
|
|
aes: Aes<'a>,
|
|
}
|
|
|
|
impl Context<'_> {
|
|
pub fn init() -> Self {
|
|
let peripherals = Peripherals::take();
|
|
let aes = Aes::new(peripherals.AES);
|
|
|
|
Context { aes }
|
|
}
|
|
}
|
|
|
|
#[cfg(not(any(
|
|
feature = "esp32c3",
|
|
feature = "esp32c6",
|
|
feature = "esp32h2",
|
|
feature = "esp32s3"
|
|
)))]
|
|
mod not_test {
|
|
#[esp_hal::entry]
|
|
fn main() -> ! {
|
|
semihosting::process::exit(0)
|
|
}
|
|
#[panic_handler]
|
|
fn panic(_info: &core::panic::PanicInfo) -> ! {
|
|
loop {}
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
#[cfg(any(
|
|
feature = "esp32c3",
|
|
feature = "esp32c6",
|
|
feature = "esp32h2",
|
|
feature = "esp32s3"
|
|
))]
|
|
#[embedded_test::tests]
|
|
mod tests {
|
|
use defmt::assert_eq;
|
|
|
|
use super::*;
|
|
|
|
#[init]
|
|
fn init() -> Context<'static> {
|
|
Context::init()
|
|
}
|
|
|
|
#[test]
|
|
fn test_aes_encryption(mut ctx: Context<'static>) {
|
|
let keytext = "SUp4SeCp@sSw0rd".as_bytes();
|
|
let plaintext = "message".as_bytes();
|
|
let encrypted_message = [
|
|
0xb3, 0xc8, 0xd2, 0x3b, 0xa7, 0x36, 0x5f, 0x18, 0x61, 0x70, 0x0, 0x3e, 0xd9, 0x3a,
|
|
0x31, 0x96,
|
|
];
|
|
|
|
// create an array with aes128 key size
|
|
let mut keybuf = [0_u8; 16];
|
|
keybuf[..keytext.len()].copy_from_slice(keytext);
|
|
|
|
// create an array with aes block size
|
|
let mut block_buf = [0_u8; 16];
|
|
block_buf[..plaintext.len()].copy_from_slice(plaintext);
|
|
|
|
let mut block = block_buf.clone();
|
|
ctx.aes.process(&mut block, Mode::Encryption128, &keybuf);
|
|
assert_eq!(block, encrypted_message);
|
|
}
|
|
|
|
#[test]
|
|
fn test_aes_decryption(mut ctx: Context<'static>) {
|
|
let keytext = "SUp4SeCp@sSw0rd".as_bytes();
|
|
let plaintext = "message".as_bytes();
|
|
let mut encrypted_message = [
|
|
0xb3, 0xc8, 0xd2, 0x3b, 0xa7, 0x36, 0x5f, 0x18, 0x61, 0x70, 0x0, 0x3e, 0xd9, 0x3a,
|
|
0x31, 0x96,
|
|
];
|
|
|
|
// create an array with aes128 key size
|
|
let mut keybuf = [0_u8; 16];
|
|
keybuf[..keytext.len()].copy_from_slice(keytext);
|
|
|
|
ctx.aes
|
|
.process(&mut encrypted_message, Mode::Decryption128, &keybuf);
|
|
assert_eq!(&encrypted_message[..plaintext.len()], plaintext);
|
|
}
|
|
}
|